An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

被引:2
作者
Zhou, Yousheng [1 ,2 ]
Chen, Xinyun [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
KEY AGREEMENT;
D O I
10.1155/2020/8886585
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Session initiation protocol (SIP), a widely used signal protocol for controlling multimedia communication sessions, is under numerous attacks when performing the authentication steps between the user and server. So secure authentication schemes are needed to be presented for SIP. Recently, Arshad et al. advanced novel schemes for SIP using elliptic curve cryptography (ECC) and claimed their schemes can resist various attacks. However, Lu et al. found that Arshad et al.'s scheme cannot resist trace and key-compromise impersonation attacks; hence, it cannot provide proper mutual authentication. Meanwhile, an enhanced scheme was advanced by Lu et al. and they stated that their scheme can stand up to possible known attacks. Nevertheless, in this paper, we conclude that Arshad and Nikooghadam's scheme is insecure against impersonation attack and Lu et al.'s scheme is still vulnerable to impersonation attack. To overcome these weaknesses of their schemes, we present a novel anonymous ECC-based scheme for SIP. Security analysis and performance analysis show that our proposed scheme can resist various known attacks and efficient in the meantime.
引用
收藏
页数:11
相关论文
共 19 条
  • [1] [Anonymous], 2013, INT J COMMUNICATION, DOI DOI 10.1002/dac.2499
  • [2] [Anonymous], 2009, Int J Netw Secur
  • [3] An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 181 - 197
  • [4] The science of guessing: analyzing an anonymized corpus of 70 million passwords
    Bonneau, Joseph
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 538 - 552
  • [5] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [6] TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS
    DENNING, DE
    SACCO, GM
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (08) : 533 - 536
  • [7] An Enhanced Authenticated Key Agreement for Session Initiation Protocol
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 333 - 342
  • [8] A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
    Irshad, Azeem
    Sher, Muhammad
    Rehman, Eid
    Ch, Shehzad Ashraf
    Ul Hassan, Mahmood
    Ghani, Anwar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (11) : 3967 - 3984
  • [9] A Survey of SIP Authentication and Key Agreement Schemes
    Kilinc, H. Hakan
    Yanik, Tugrul
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02) : 1005 - 1023
  • [10] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193